Transport Layer Security (TLS)

16th February 2020 | Cybrary Transport Layer Security (TLS)


Transport Layer Security (TLS) is a security protocol made for privacy and data security for communications over the Internet. A primary use case of TLS is encrypting the communication between web applications and servers, such as web browsers loading a website.  TLS can also be used to encrypt other communications such as email, messaging, and voice over IP (VOIP). If you are to look at the URLs of most websites, they feature the security protocol HTTPS, for example, https://cyberhoot.com/. Wherever there is HTTPS used, it is employing TLS encryption.

TLS v1.2 is Flawed, You should be Using TLS v1.3

In recent years, TLS 1.2 flaws have been identified which necessitated a migration to TLS version 1.3 which is more secure, efficient, and the gold standard for online encrypted communications.  If you’re not using TLS 1.3 yet, you should be. Watch the advanced video below to know why.

Source: CloudFlare

Related Terms: Encryption

What does this mean for an SMB?

Whenever your employees are on the Internet, they should always be aware of the URL and ensuring that HTTPS is employed for a secure connection.  

To learn more about Transport Layer Security, watch these short videos:

The Basics: TLS, SSL, and Handshakes

Advanced: How TLS 1.3 works better!

https://www.youtube.com/embed/AlE5X1NlHgg

Are you doing enough to protect your business?

Sign up with CyberHoot today and sleep better knowing your

employees are cyber trained and on guard!


Sign Up Today!

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

PromptSpy: The Android Malware That Hired an AI Assistant

PromptSpy: The Android Malware That Hired an AI Assistant

And yes, Google's Gemini AI had no idea it was working for the bad guys. Malware has always followed a script....

Read more
Ransomware Entry Points are Changing. Here Is What to Do About It?

Ransomware Entry Points are Changing. Here Is What to Do About It?

Ransomware groups are not breaking in organizations the same way they did five years ago. The entry methods have...

Read more
Malicious Chrome Extension Disguised as  a Business Tools

Malicious Chrome Extension Disguised as a Business Tools

If a Chrome extension promises to remove security pop-ups and generate MFA codes, that should make you...

Read more